找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: International Conference on Intelligent Computing and Applications; ICICA 2016 Subhransu Sekhar Dash,Swagatam Das,Bijaya Ketan Pa Conferenc

[复制链接]
楼主: panache
发表于 2025-3-25 03:45:42 | 显示全部楼层
Performance Evaluation of Fingerprint Trait Authentication System,he biometric trait with the stored template. Fingerprint is the most popularly used for authentication due to the simplicity in capturing the fingerprint image. Human biometric traits such as fingerprint, iris, and palmprint can be used to identify the person due to its unique texture pattern. In th
发表于 2025-3-25 09:45:22 | 显示全部楼层
Graphical Password Using an Intuitive Approach,nse of Internet and human–computer interaction has created new threats of unauthorized access and data exploitation. Traditional methods of authentication have been text-based password schemes. However, the major drawback with them has been the fact that their strength varies inversely with user con
发表于 2025-3-25 12:36:38 | 显示全部楼层
发表于 2025-3-25 17:17:15 | 显示全部楼层
Comparative Study of Android-Based M-Apps for Farmers,This paper highlights the mobile applications for agriculture, where architecture of mobile phone with its current trends and the most useful M-Apps related to agriculture market, soil description, weather information, and government schemes have been described in detail. In this paper, Android-base
发表于 2025-3-25 23:24:13 | 显示全部楼层
Feature Extraction of DICOM Images Using Canny Edge Detection Algorithm,ere captured in Digital Imaging and Communication in Medicine (DICOM) format (Bhagat and Atique in Medical Images: Formats, Compression Techniques and Dicom Image Retrieval Survey, 2012) [.]. As per the structure of DICOM image, physicians were unable to detect strangeness or disease in the patient
发表于 2025-3-26 04:00:37 | 显示全部楼层
Design of 2-Bit Parallel Asynchronous Self-timed Adder and 2-Bit Parallel Adder Using Radix Adder,r-delay product, and number of transistors to design different adders. The parallel asynchronous self-timed adder designed using half adder along 2:1 multiplexer requires minimum interconnection. These adders have propensity to run faster than existing adders for random data. Parallel adder based on
发表于 2025-3-26 07:35:06 | 显示全部楼层
发表于 2025-3-26 09:10:39 | 显示全部楼层
发表于 2025-3-26 16:11:44 | 显示全部楼层
A Model of Legal and Procedural Framework for Cybercrime Investigation in India Using Digital Imagenforcement agency has to adopt a legal and procedural framework for their investigation process. This paper aims to propose a model of legal and procedural framework in cybercrime investigation where a digital image is considered as primary evidence. The model is constructed based on Indian laws and regulations.
发表于 2025-3-26 17:01:49 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-22 18:15
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表